EP2067364B1 - P-cscf fast handoff for ims/mms architecture - Google Patents
P-cscf fast handoff for ims/mms architecture Download PDFInfo
- Publication number
- EP2067364B1 EP2067364B1 EP07838064.9A EP07838064A EP2067364B1 EP 2067364 B1 EP2067364 B1 EP 2067364B1 EP 07838064 A EP07838064 A EP 07838064A EP 2067364 B1 EP2067364 B1 EP 2067364B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- cscf
- sip
- mobile node
- component
- sip component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 claims description 64
- 230000011664 signaling Effects 0.000 claims description 21
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 238000012546 transfer Methods 0.000 description 41
- 239000003795 chemical substances by application Substances 0.000 description 27
- 230000007246 mechanism Effects 0.000 description 16
- 230000008569 process Effects 0.000 description 11
- 230000008859 change Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000005457 optimization Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1083—In-session procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0016—Hand-off preparation specially adapted for end-to-end data sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/08—Upper layer protocols
- H04W80/10—Upper layer protocols adapted for application session management, e.g. SIP [Session Initiation Protocol]
Definitions
- the present invention relates generally to IMS/MMD architecture, and more specifically to proxy signaling entity fast handoff in IMS/MMD networks.
- An IMS/MMD (Multimedia Domain) network or architecture primarily consists of several signaling entities such as proxy-call session control function (P-CSCF), interrogating-CSCF (I-CSCF), serving-CSCF (S-CSCF), and home subscriber service (HSS) which is usually a database or other repository for user or subscriber information such as authorization data, including information related to services provided to a user.
- Roaming service and mobility are supported by a combination of Session Initiation Protocol (SIP) components such as the signaling entities, P-CSCF, S-CSCF, I-CSCF, and mobile IP components or nodes, such as home agent (HA) and foreign agent (FA).
- IP Session Initiation Protocol
- SA security association
- SA security association
- IPSec Secure Internet Protocol
- UE user equipment
- MN Mobile Node
- IMS is essentially an overlay to the packet data subsystem (PDS) and has a low dependency on the PDS as it can be deployed without the multimedia session capability. Consequently, a separate SA is required between the multimedia client and the IMS before access is granted to multimedia services.
- PDS packet data subsystem
- the primary focus of the IMS/MMD security architecture is the protection of SIP signaling between the subscriber and the IMS.
- the IMS defines a means of mutual authentication between the subscriber and the IMS, and also specifies mechanisms for securing inter- and intra-domain communication between IMS network elements.
- P-CSCF is the first entry point in a visited network as far as SIP signaling is concerned.
- a P-CSCF has multiple roles in the network as defined by IMS/MMD standard. Primarily it acts like the first hop outbound proxy for the mobile. Any SIP related messages (e.g., REGISTER, INVITE etc.) have to traverse via this P-CSCF. Although these are supposed to behave as proxies, they are call-stateful proxies, and thus each P-CSCF is equipped with client daemon and server daemon and is capable of generating any non-INVITE messages. Thus during handoff, P-CSCF plays an important role both for signaling and media.
- P-CSCF packet data servicing node
- Figure 1 gives the details call flow during handoff when P-CSCF fast handoff is absent.
- normal SIP registration with authentication and key agreement (AKA) happens with the new P-CSCF.
- the gate at the new PDSN will not be open and thereby will not allow any packet from Mobile Node to traverse through the new visited network, except MIP binding update and SIP registration signaling. This is primarily because no SA exists between MN and new P-CSCF. Thus, there can be a substantial delay depending upon the load at the new P-CSCF and the time required to establish an IPSec SA between Mobile Node and new P-CSCF.
- a boxed portion of Figure 1 indicates the period whereby the session will be interrupted for signaling, except SIP registration and MIP binding update, since no other signaling messages can be exchanged during this time, e.g., auxiliary signaling such as paging, IM etc.
- Figure 2 shows the media delay during handoff without fast P-CSCF handoff mechanism in place.
- the media delay is significant since MN cannot send any packet unless the gate at the new PDSN is open during the registration process although MIP update is performed earlier.
- EP 1662726 A1 “System and method for seamless handoff of wlan-umts interworking" discloses a scheme that buffers packets being delivered to a mobile node, MN, during the handoff period, then delivering the buffered packets to the MN upon completion of the handoff.
- the present invention advantageously provides methods for mitigating such delay issues and providing some alternative mechanisms that may be used if media security is also required in certain applications.
- Fast handoff can be achieved by two well-known concepts: i) Proactive Handover and ii) Reactive Handover.
- proactive handover means both network and Mobile Node prepare themselves for handover a-priori before connecting to a new access link, i.e., layers 1 and 2.
- reactive handover refers to handover preparation as and when Mobile Node connects to a new access link. While handover can be initiated by both network and Mobile Node, only network controlled Mobile Node assisted fast handoff mechanisms are described. These same techniques could be applied to mobile controlled networks as well.
- proactive handover means handover preparation for a new link occur while the mobile is still connected to an existing link.
- delay There are several components that constitute the delay, both media dependent and media independent, during handover and the goal of this handover technique is to minimize such delays and associated packet loss.
- MPA Media independent Pre-Authentication
- minimizing the handoff delay using this mechanism is described, along with techniques using pre-registration to establish AKA ahead of time.
- Proactive authentication including MPA assisted handoff belongs to the proactive handoff category.
- the mobile discovers the new network 22 and the associated elements through a discovery mechanism.
- discovery mechanisms are known in the art.
- the mobile pre-authenticates via the proxy, generally P-CSCF 14, in the new network 22 and performs a pre-registration with S-CSCF 16.
- P-CSCF 14 the proxy
- S-CSCF 16 the proxy
- AKA procedure is also performed and a new security association is established.
- the context state transfer takes place between previous or old P-CSCF 12 and new P-CSCF 14.
- FIG. 3 shows the call flows illustrating the use of MPA for MIPv4 FA-assisted CoA.
- the key mechanism behind MPA is its pre-authentication and pre-registration procedure 28 that helps to establish the security association in advance, and reduces the media handoff delay that would otherwise occur after the handoff.
- the following are the events that occur before the handoff and after the handoff.
- MIP update is shown in the new network 22. However, it may be possible to send the MIP update in the previous (old) network 24, to avoid the delay due to binding update altogether.
- MPA 28 used to provide fast-handoff in an MIPv6 network that may use MIPv6 CoA or SIP mobility is presented, and the call flow of MPA 28 that can be used with MIPv6 is described.
- MIPv4 with FA-CoA there is no FA in MIPv6, and the mobile gets the new CoA upon every move. If SIP procedure is involved, it follows more or less the same steps as in MIPv4 case. However in the absence of FA, binding update can be sent proactively in addition to pre-registration, helping to complete the AKA procedure.
- FIG. 4 illustrates the call flows or the sequence of operation that might happen during the handoff process.
- the network elements are assumed to have the following capabilities:
- FIG. 5 depicts the call flows for a scenario where old P-CSCF 12 transfers call state information including SA keys 32 for a Mobile Node 10 to new P-CSCF 14 after receiving a command from S-CSCF 16.
- the call flow is as follows:
- FIG. 6 depicts the call flows for a scenario where old P-CSCF 12 transfers call state information, e.g., QoS and CDRs, and S-CSCF 16 transfers the key information, e.g. SA keys 32, to new P-CSCF 14.
- call state information e.g., QoS and CDRs
- S-CSCF 16 transfers the key information, e.g. SA keys 32, to new P-CSCF 14.
- the command for context transfer comes from S-CSCF 16.
- the only difference here is the key transfer.
- the call flow, before handover is as follows.
- the call flow, after handover, is the same as above.
- Reactive handover employs handover preparation as and when access link change happens. There are several components that constitute or cause the delay during reactive handover, and in general this delay is much higher than proactive handover. Accordingly, techniques to perform and to minimize handover delay are presented.
- network controlled means S-CSCF 16 control handover. It is also assumed, in the alternatives described below, that network elements have the following capabilities:
- FIG. 7 depicts the call flows for a scenario where old P-CSCF 12 transfers call state information including SA keys 32 of a Mobile Node 10 to new P-CSCF 14 after receiving a command from S-CSCF 16.
- the call flow is as follows:
- FIG. 8 depicts the call flows for a scenario where new P-CSCF 14 fetches call state information including SA keys 32 of a Mobile Node 10 from old P-CSCF 12 after receiving a command from S-CSCF 16.
- the call flow before the handover is the same as for the above reactive push model; the call flow after the handover is as follows:
- FIG 9 depicts the call flows for the scenario where old P-CSCF 12 transfers call state information, and S-CSCF 16 transfers the key information 32 to new P-CSCF 14.
- the command for context transfer comes from S-CSCF 16.
- the only difference here is the key transfer.
- the call flow before handover is the same as the other reactive embodiments, and the call flow after handover is as follows:
- FIG 10 depicts the call flows for the scenario where new P-CSCF 14 fetches call state information from old P-CSCF 12 and S-CSCF 16 transfers the key information 32 to new P-CSCF 14.
- the command for context transfer comes from S-CSCF 16 as in the other reactive embodiments.
- the only difference here is the key transfer.
- the call flow before handover is the same as the other reactive embodiments, and the call flow after handover is as follows:
- a simple scenario to demonstrate bootstrapping of IPSec SAs during the course of SIP registration in the IMS/MMD network is presented.
- a second scenario will demonstrate IPSec state transfer followed by rapid establishment of IPSec SAs during P-CSCF handoff.
- the latter scenario will also demonstrate the use of a context transfer mechanism involving both P-CSCFs and S-CSCF 16. Many of the optimization techniques can be realized using common SIP methods.
- the security association in the target proxy can be set up ahead of time by performing proactive AKA.
- proactive AKA the mobile can pre-register via the target P-CSCF even if the mobile is in the previous network.
- the mobile uses a network discovery mechanism, the mobile determines the first hop proxy (new P-CSCF 14 ) in the neighboring or visited network 22 and registers with home S-CSCF 16, but uses new P-CSCF 14 as the current outbound proxy. Since AKA process is established by virtue of registration process, a new security association is established with new P-CSCF 14. Since new security association is established, it helps to open the gate at the PDSN in the new network. This will avoid the delay associated with the AKA procedure and opening the gate.
- FIG 11 shows a bootstrapping scenario in IMS/MMD architecture, and illustrates IPSec SA creation during initial registration.
- Mobile Node 10 performs the SIP registration procedure with the S-CSCF 16 via visited network 1's 22 P-CSCF 14.
- Mobile Node 10 also establishes an IPSec SA 26 with the P-CSCF 14.
- Figure 12 illustrates message flows associated with a scenario where the IPSec SAs have not been established successfully. As a consequence, SIP registration will fail, which will be shown as registration failure.
- SA keys are preconfigured at the P-CSCF and Mobile Node 10, and these SA keys trigger the creation of IPSec SAs via the SIP Registration process.
- SA creation failure could be demonstrated by intentionally misconfiguring keys at the P-CSCF.
- the keys are transferred from the S-CSCF 16 to the P-CSCF as part of the SIP Registration procedure.
- Figure 13 shows the optimized handoff scenario for IPSec SAs.
- the UE will move from visited network 1 22 to visited network 2 34.
- the UE's context information e.g. IPSec SA keys 32
- the UE's context information e.g. IPSec SA keys 32
- This will be achieved by obtaining a movement indication message from the UE before Mobile Node 10 moves to network 2 34.
- the UE or Mobile Node 10 will also establish SAs 26 with the new P-CSCF 14 prior to moving to network 2 34.
- the message flows associated with this scenario are shown in Figure 14 .
- the keys 32 are transferred from the old P-CSCF 12 to the new P-CSCF 14 using a simple CXTP implementation over TCP/UDP.
- the keys 32 are transferred from S-CSCF 16 to P-CSCF 14. Sending a notification from the old P-CSCF 12 to the S-CSCF 16 indicating UE's intention to move would cause S-CSCF 16 to pro-actively transfer the keys 32 to the new P-CSCF 14.
- movement indication will be provided by the UE and the address of the new P-CSCF 14 will be hard coded at the UE, and transferred to the old P-CSCF 12 as part of the move notification. Any mechanism to predict the next P-CSCF 14 can be used.
- Implementation details of an embodiment of the security optimization that has been carried out in the IMS/MMS architecture are presented, including the complete architecture of the software agents associated with Mobile Node 10, P-CSCF 12,14, and S-CSCF 16. These agent architectures illustrate the basic functionalities of the software modules installed in each of these functional components.
- the proof-of-concept of some of the security optimization techniques using software agents that use XML over TCP has been completed.
- S-CSCF 16 and P-CSCF 12,14 can be enhanced to provide these techniques using several SIP methods such as SUBSCRIBE, NOTIFY, MESSAGE. These methods can carry similar XML messages in the body to do the context transfer 30 between P-CSCFs 12, 14 and between S-CSCF 16 and P-CSCF 12.
- Figure 15 shows implementation steps for three different scenarios: a) bootstrapping, b) context generation, and c) mobility, illustrating the interaction between different functional modules or entities, such as Mobile Node 10, P-CSCFs 12,14 and S-CSCF 16.
- Each of these entities has agents that interact with each other to provide the desired functionality. The details of these agents, and different messages these agents can send and receive, are described below.
- the mobile agent is pre-provisioned with a sequence of keys that may be used for setting up SAs with various P-CSCFs.
- a single key would be pre-provisioned at the mobile, and SA keys would be generated by applying appropriate functions on this single key in conjunction with random numbers from the P-CSCF (as part of AKA).
- Mobile Node 10 On startup, Mobile Node 10 snoops for an outgoing registration message. When this message is detected, Mobile Node 10 sets up an SA with the current P-CSCF 12 using the first key in its pre-provisioned list. When movement to a different P-CSCF 14 becomes imminent, Mobile Node 10 sends an XML encoded MoveNotify message to its current P-CSCF 12. The only parameter carried by this message is the IP address of next P-CSCF 14 to which this Mobile Node 10 expects to move. The mechanism by which Mobile Node 10 is able to infer the identity of the next P-CSCF 14 is out of the scope of this implementation. After sending the MoveNotify message, Mobile Node 10 uses the next key in its list to establish an SA 26 with the next P-CSCF 14.
- the agent architecture for P-CSCF, and how the P-CSCF handles different messages, is as follows.
- the P-CSCF agent runs in two Java threads.
- a "snooper" thread snoops for REGISTRATION and INVITE message from Mobile Node 10.
- the GetKey message is a request to obtain the current key from the S-CSCF 16 defined for this specific mobile.
- the P-CSCF agent On detection of an INVITE message, the P-CSCF agent generates a local context record for Mobile Node 10 as shown in Figures 15a ), b), and c).
- the P-CSCF agent also runs a thread that listens for several messages. On receiving a MoveNotify from Mobile Node 10, the agent sends a corresponding MoveNotify to the S-CSCF 16 with the addresses of the next PCSCF 14 and Mobile Node 10 as parameters. This message also triggers the context transfer procedures 30 at the S-CSCF 16. This agent also listens for the KeyMsg message from the S-CSCF 16 that contains the keying information for a specific mobile node and establishes an SA 26 with Mobile Node upon receipt. The agent also listens for a Context Transfer message from a previous P-CSCF 12 containing the IP address of Mobile Node 10 whose context is being transferred along with the actual context information being transferred.
- the agent sets up the local context for Mobile Node 10 using the received context information.
- the agent also listens for a Do Context Transfer message from the S-CSCF 16 carrying the address of Mobile Node 10 whose context needs to be transferred, and the address of the P-CSCF 14 to which the context needs to be transferred.
- the agent executes the actual context transfer 30 to new P-CSCF 14 by using the Context Transfer message described above.
- S-CSCF 16 agent listens for GetKey and MoveNotify messages from P-CSCFs in visited networks.
- the GetKey message contains the IP address of a Mobile Node 10 as a parameter and triggers a key lookup for that Mobile Node 10.
- the agent sends a KeyMsg to the requesting P-CSCF with the keying data and Mobile Node's IP address as parameters.
- the MoveNotify message contains the address of Mobile Node 10 intending to change P-CSCFs as well as the address of the next P-CSCF 14 to which Mobile Node 10 plans to move.
- the agent looks up current key for Mobile Node 10 and sends a KeyMsg to the next P-CSCF 14 containing the keying information and the IP address of Mobile Node 10 as parameters.
- the agent then sends a Do Context Transfer message to Mobile Node's current P-CSCF 12, with the IP addresses of Mobile Node 10 and the next P-CSCF 14 to which Mobile Node 10 plans to move.
- Figure 16 shows another proactive handoff scenario that has been implemented in the current IMS/MMD architecture. This actually emulates the some of the functions that are performed by AKA. This way, the packet loss due to handoff is limited to MIP delay and layer 2 handoff delay only.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Description
- The present invention relates generally to IMS/MMD architecture, and more specifically to proxy signaling entity fast handoff in IMS/MMD networks.
- An IMS/MMD (Multimedia Domain) network or architecture primarily consists of several signaling entities such as proxy-call session control function (P-CSCF), interrogating-CSCF (I-CSCF), serving-CSCF (S-CSCF), and home subscriber service (HSS) which is usually a database or other repository for user or subscriber information such as authorization data, including information related to services provided to a user. Roaming service and mobility are supported by a combination of Session Initiation Protocol (SIP) components such as the signaling entities, P-CSCF, S-CSCF, I-CSCF, and mobile IP components or nodes, such as home agent (HA) and foreign agent (FA). IMS/MMD architecture mandates that there should be security association (SA) between the mobile and P-CSCF. Secure Internet Protocol (IPSec) is one way of providing SA for signaling and media traffic.
- In the MMD, service is not provided until an SA is established between the user equipment (UE) and the network. Typically, UE is a Mobile Node (MN). IMS is essentially an overlay to the packet data subsystem (PDS) and has a low dependency on the PDS as it can be deployed without the multimedia session capability. Consequently, a separate SA is required between the multimedia client and the IMS before access is granted to multimedia services.
- The primary focus of the IMS/MMD security architecture is the protection of SIP signaling between the subscriber and the IMS. The IMS defines a means of mutual authentication between the subscriber and the IMS, and also specifies mechanisms for securing inter- and intra-domain communication between IMS network elements.
- In an IMS/MMD environment, P-CSCF is the first entry point in a visited network as far as SIP signaling is concerned. A P-CSCF has multiple roles in the network as defined by IMS/MMD standard. Primarily it acts like the first hop outbound proxy for the mobile. Any SIP related messages (e.g., REGISTER, INVITE etc.) have to traverse via this P-CSCF. Although these are supposed to behave as proxies, they are call-stateful proxies, and thus each P-CSCF is equipped with client daemon and server daemon and is capable of generating any non-INVITE messages. Thus during handoff, P-CSCF plays an important role both for signaling and media. Media cannot traverse through a new packet data servicing node (PDSN) in the visited network during handoff until a new SA between P-CSCF and MN has been established. Thus it is essential to have all security states transferred from old P-CSCF to new P-CSCF before any new media passes through the new PDSN for security optimization. For an IMS/MMD architecture, where all P-CSCFs are in the visited network, this has even more significance in terms of local quality of service (QoS) and pricing information. Since P-CSCF maintains such information, until these parameters are properly transferred from the old-P-CSCF to new P-CSCF, the handoff will not be fast. In order to have a seamless handover for a real time session between two visited networks, fast P-CSCF transition is essential, and is commonly known as P-CSCF fast handoff.
- How the signaling and media will be affected if there is no fast P-CSCF handoff mechanism in place is described. After that, the fast handoff mechanisms both for proactive and reactive handovers are discussed and details regarding how the signaling and media delay during handover can be minimized are presented.
-
Figure 1 gives the details call flow during handoff when P-CSCF fast handoff is absent. In this scenario, normal SIP registration with authentication and key agreement (AKA) happens with the new P-CSCF. - Unless the registration is successful, the gate at the new PDSN will not be open and thereby will not allow any packet from Mobile Node to traverse through the new visited network, except MIP binding update and SIP registration signaling. This is primarily because no SA exists between MN and new P-CSCF. Thus, there can be a substantial delay depending upon the load at the new P-CSCF and the time required to establish an IPSec SA between Mobile Node and new P-CSCF. A boxed portion of
Figure 1 indicates the period whereby the session will be interrupted for signaling, except SIP registration and MIP binding update, since no other signaling messages can be exchanged during this time, e.g., auxiliary signaling such as paging, IM etc. Once the gate at new PDSN is open, MN can send and receive other signaling along with the media. - Similarly,
Figure 2 shows the media delay during handoff without fast P-CSCF handoff mechanism in place. The media delay is significant since MN cannot send any packet unless the gate at the new PDSN is open during the registration process although MIP update is performed earlier. Also, there can be a substantial increase to the delay value depending upon the P-CSCF load, HA load and the distance between HA and MN. This delay can range from several hundred milliseconds to seconds in some cases. Thus for delay sensitive real time applications, delay is an issue. - HYUN-HO CHOI ET AL's paper "Seamless Handoff Scheme Based on Pre-registration and Pre-authentication for UMTSWLAN Interworking", XP019509774, ISSN:1572-834X, discloses a scheme which relies on the Home Agent performing packet buffering and forwarding functions while managing two care of addresses, CoAs, during the handoff.
-
EP 1662726 A1 , "System and method for seamless handoff of wlan-umts interworking", discloses a scheme that buffers packets being delivered to a mobile node, MN, during the handoff period, then delivering the buffered packets to the MN upon completion of the handoff. - KIM LYNGGAARD LARSEN ET AL's paper "Optimized Macro Mobility within the 3GPP IP Multimedia Subsystem", XP031056650, ISBN: 978-7695-2629-4, describes a solution that reduces the handover delay by sharing, via a context transfer, the IMS registration and IMS call state information.
- The present invention advantageously provides methods for mitigating such delay issues and providing some alternative mechanisms that may be used if media security is also required in certain applications.
- The following abbreviations are used throughout.
- AKA: authentication and key agreement
- CDR: call data record
- CH: correspondent host
- CoA: care-of Address
- CXTP: context transfer protocol
- FA: foreign agent
- HA: home agent
- HSS: home subscriber service
- IMS: IP Multimedia Subsystem
- IMS/MMD: combination of IMS and MMD
- IPSec: suite of security protocols
- MIPv4: Mobile IPv4
- MIPv6: Mobile IP6
- MID: Multimedia Domain
- MN: mobile node
- MPA: Media independent Pre-Authentication
- PCRF: policy control rules function
- P-CSCF: Proxy Call Session Control Function
- PDG: packet data gateway
- PDIF: packet data interworking function
- PDS: packet data subsystem
- PDSN: Packet Data Serving Node
- QoS: Quality of Service
- SA: security association
- S-CSCF: Serving Call Session Control Function
- SIP: session initiation protocol
- TCP: transmission control protocol
- UDP: user datagram protocol
- UE: user equipment
- The invention is further described in the detailed description that follows, by reference to the noted drawings by way of non-limiting illustrative embodiments of the invention, in which like reference numerals represent similar parts throughout the drawings. As should be understood, however, the invention is not limited to the precise arrangements and instrumentalities shown. In the drawings:
-
Figure 1 illustrates Impact on Signaling without P-CSCF Fast Handoff; -
Figure 2 illustrates Impact on Media without P-CSCF Fast Handoff; -
Figure 3 illustrates MPA with MIPv4 - FA assisted; -
Figure 4 illustrates MPA with IPv6; -
Figure 5 illustrates Fast Handoff with CXTP via P-CSCF (Push Model) including SA Keys; -
Figure 6 illustrates Fast Handoff with CXTP via P-CSCF (Push Model) including SA Keys Transferred via S_CSCF; -
Figure 7 illustrates Reactive Fast Handoff with CXTP via P-CSCF (Push Model) including SA Keys; -
Figure 8 illustrates Reactive Fast Handoff with CXTP via P-CSCF (Pull Model) including SA Keys; -
Figure 9 illustrates Reactive Fast Handoff with CXTP via P-CSCF (Push Model) including SA Keys Transferred via S_CSCF; -
Figure 10 illustrates Reactive Fast Handoff with CXTP via P-CSCF (Pull Model) including SA Keys Transferred via S_CSCF; -
Figure 11 illustrates Bootstrapping of IPSec SAs; -
Figure 12 illustrates Message Flow for IPSec SA Bootstrapping; -
Figure 13 illustrates Optimized IPSec Handoff Scenario; -
Figure 14 illustrates Optimized IPSec Handoff Call Flow; -
Figure 15a illustrates Flow Diagram for Implementation of a Bootstrapping Case; -
Figure 15b illustrates Flow Diagram for Implementation of a Context Generation Case; -
Figure 15 illustrates Flow Diagram for Implementation of a Mobility Case; and -
Figure 16 illustrates an example of proactive handoff implementation. - Fast handoff can be achieved by two well-known concepts: i) Proactive Handover and ii) Reactive Handover. By definition, proactive handover means both network and Mobile Node prepare themselves for handover a-priori before connecting to a new access link, i.e., layers 1 and 2. On the other hand, reactive handover refers to handover preparation as and when Mobile Node connects to a new access link. While handover can be initiated by both network and Mobile Node, only network controlled Mobile Node assisted fast handoff mechanisms are described. These same techniques could be applied to mobile controlled networks as well.
- As discussed above, proactive handover means handover preparation for a new link occur while the mobile is still connected to an existing link. There are several components that constitute the delay, both media dependent and media independent, during handover and the goal of this handover technique is to minimize such delays and associated packet loss. In addition to network assisted handover control, a media independent mechanism known as MPA (Media independent Pre-Authentication), and minimizing the handoff delay using this mechanism, is described, along with techniques using pre-registration to establish AKA ahead of time.
- Proactive authentication including MPA assisted handoff belongs to the proactive handoff category. In this scenario, illustrated in
Figures 3 and4 , the mobile discovers thenew network 22 and the associated elements through a discovery mechanism. Such discovery mechanisms are known in the art. Once either the mobile determines that it is about to handover, or the network directs the mobile to handover, the mobile pre-authenticates via the proxy, generally P-CSCF 14, in thenew network 22 and performs a pre-registration with S-CSCF 16. As part of pre-registration, AKA procedure is also performed and a new security association is established. As soon as the security association is established, the context state transfer takes place between previous or old P-CSCF 12 and new P-CSCF 14. After the security association is established and the context transfer is done between the P-CSCFs, the gate for media opens up. In case of IPv6, pre-configuration also takes place. However, in case of MIPv4 with FA-COA,Mobile Node 10 does not change its own address. In this MPA security association, context transfer and MIP binding update takes place ahead of the physical transfer, so that the only delay experienced is the delay due tolayer 2 handoff. - Below the call flows for both MIPv4 and MIPv6 case using MPA type mechanism are shown.
-
Figure 3 shows the call flows illustrating the use of MPA for MIPv4 FA-assisted CoA. The key mechanism behind MPA is its pre-authentication andpre-registration procedure 28 that helps to establish the security association in advance, and reduces the media handoff delay that would otherwise occur after the handoff. The following are the events that occur before the handoff and after the handoff. - P-
CSCF 12 subscribes to mobility event package with S-CSCF 16 (via SUBSCRIBE/NOTIFY) and vice versa. - P-
CSCF 12 also subscribes to mobility event package with Mobile Node 10 (via SUBSCRIBE). - When the mobile is in the
old network 24, security association is in place as part of the initial AKA procedure and the gate is open. Thus there is a communication betweenMobile Node 10 and CH viaHA 20. -
Mobile Node 10 receives some early indications for subnet change based on some policy decision, for example, indication that movement is imminent 18. -
Mobile Node 10 uses a certain network discovery scheme to determine the neighboring network elements such as the new P-CSCF 14 and other authentication server. - As part of the
pre-authentication procedure 28,Mobile Node 10 initiates apre-registration procedure 28 with the S-CSCF 16 via new P-CSCF 14. - As a result of this
procedure 28, the AKA is performed and the new P-CSCF 14 gets the key from S-CSCF 16 that is used to establish thesecurity association 26 at new P-CSCF 14; at present, this would have taken place after the mobile has moved. - Similarly a
new security association 26 is also created atMobile Node 10 to secure the communication betweenMobile Node 10 and new P-CSCF 14. -
State transfer 30 from old P-CSCF 12 to new P-CSCF 14 can be performed based on the notification from S-CSCF 16. - At this point; gate is open in the new (visited)
network 22, since bothsecurity association 26 andstate transfer 30 have been complete. - Mobile IP update has not been done ahead of time here, thus all the registration messages would still go through FA1. MIP update, if performed before the mobile's movement to the
new network 22, may result in a routing loop and is thus avoided before the handoff. - As the mobile moves to the
new network 22, and listens to the FA2 advertisement, it triggers a new binding update, and MIP procedure is complete. - As soon as the MIP update is performed, new media can flow in the
new network 22 without getting delayed by a factor of time that is usually required for AKA procedure and context state transfer. -
Mobile Node 10 may choose to perform a re-registration with the S-CSCF 16 without affecting the already establishedsecurity association 26 at new P-CSCF 14. - By indicating
movement 18 and performing theMPA procedure 28 including theAKA procedure 28 ahead of time,Mobile Node 10 can benefit from the reduced packet loss that is limited to the time taken due tolayer 2 handoff and binding update. - The effect of MPA on the new incoming calls when the mobile is in the
old network 24 but is registered via new P2 may require further investigation but it is likely that any new call can also be transferred during the transient period, e.g., between the time mobile has done a registration, via new P-CSCF 14 and has moved to the new or visitednetwork 22. - In the call flows illustrated in
Figures 3 and4 , MIP update is shown in thenew network 22. However, it may be possible to send the MIP update in the previous (old)network 24, to avoid the delay due to binding update altogether. -
MPA 28 used to provide fast-handoff in an MIPv6 network that may use MIPv6 CoA or SIP mobility is presented, and the call flow ofMPA 28 that can be used with MIPv6 is described. Unlike MIPv4 with FA-CoA, there is no FA in MIPv6, and the mobile gets the new CoA upon every move. If SIP procedure is involved, it follows more or less the same steps as in MIPv4 case. However in the absence of FA, binding update can be sent proactively in addition to pre-registration, helping to complete the AKA procedure. -
Figure 4 illustrates the call flows or the sequence of operation that might happen during the handoff process. - P-
CSCF 12 subscribes to mobility event package with S-CSCF 16 (via SUBSCRIBE/NOTIFY) and vice versa. - P-
CSCF 12 also subscribes to mobility event package with Mobile Node 10 (via SUBSCRIBE). - When the mobile is in the
old network 24, security association is in place as part of initial AKA procedure and the gate is open. Thus, there is a communication betweenMobile Node 10 and CH viaHA 20. -
Mobile Node 10 receives some early indications forsubnet change 18 based on some policy decision. -
Mobile Node 10 uses a certain network discovery scheme to determine the neighboring network elements such as the new P-CSCF 14 and other authentication server. - As part of the
pre-authentication procedure 28,Mobile Node 10 initiates apre-registration procedure 28 with the S-CSCF 16 via new P-CSCF 14. - As a result of this
procedure 28, the AKA is performed and the new P-CSCF 14 gets the SA key 32 from S-CSCF 16 that is used to establish thesecurity association 26 at new P-CSCF 14; at present, this would have taken place after the mobile had moved. - Similarly a
new security association 26 is also created atMobile Node 10 to secure the communication betweenMobile Node 10 and new P-CSCF 14. - At the same time, S-
CSCF 16 can notify old P-CSCF 12 to start thecontext transfer 30 of QoS and pricing information from old P-CSCF 12 to new P-CSCF 14. - Once AKA procedure is done via new P-
CSCF 14 andcontext transfer 30 is over, the gate opens up in thenew network 22. - As part of the
MPA procedure 28, the mobile has also obtained its new CoA while in theprevious network 24. -
Mobile Node 10 sends a proactive binding update thus allowing the media to flow through the new PDSN without bidirectional tunnels throughHA 20. - At some point, based on a certain policy, the mobile decides to move to the
new network 22 and changes its point of attachment. - Since the SA is already established 26,
context transfer 30 is complete, the gate has already opened up and thus media flows through thenew network 22. - The only delay introduced is the delay due to
layer 2 handoff. - Network controlled means S-
CSCF 16 control handover. The network elements are assumed to have the following capabilities: - Mobility event package is supported by the S-
CSCF 16 and P-CSCFs. - A context transfer protocol (CXTP) is available between P-CSCFs.
- SA can exist between P-CSCFs and between S-
CSCF 16 and P-CSCF. - Two methods by which one can minimize the handoff delay for an IMS/MMD architecture, proactive handover and reactive handover, are presented.
-
Figure 5 depicts the call flows for a scenario where old P-CSCF 12 transfers call state information includingSA keys 32 for aMobile Node 10 to new P-CSCF 14 after receiving a command from S-CSCF 16. The call flow is as follows: - Before Handover:
- o P-
CSCF 12 subscribes to mobility event package with S-CSCF 16 (via SUBSCRIBE/NOTIFY) and vice versa. - o P-
CSCF 12 also subscribes to mobility event package with Mobile Node 10 (via SUBSCRIBE). -
o Mobile Node 10 receives some early indications on subnet change. -
o Mobile Node 10 notifies the P-CSCF 12 of any impending orimminent movement 18 with target or new P-CSCF 14 address and old P-CSCF 12 forwards the target address to S-CSCF 16 (via NOTIFY). - o S-
CSCF 16 sends the new P-CSCF 14 address to old P-CSCF 12 (via NOTIFY). - ∘ Old P-
CSCF 12 transfers call state information includingMobile Node 10SA keys 32 to new P-CSCF 14. - o New P-
CSCF 14 establishes theSA 26 forMobile Node 10 and the gate is open forMobile Node 10 at the new PDSN. -
o Mobile Node 10 receives definite indication regarding handover and connects to new access link.
- o P-
- After Handover:
-
o Mobile Node 10 sends MIP binding update to theHA 20 as the interface address changes. - o Media flow resumes as soon as mobile receives the binding acknowledge-ment, and thereby handover completes.
-
o Mobile Node 10 sends a SIP registration message as the interface address changes (REGISTER). New P-CSCF 14 forwards it to S-CSCF 16. -
o Mobile Node 10 and S-CSCF 16 also completes the registration process via normal AKA procedure. - o All incoming calls are forwarded to new P-
CSCF 14
-
- Thus it is evident that handoff delay has been reduced significantly using proactive handover techniques. Both proactive and handover delay parts are indicated by dotted-line arrows in
Figure 5 . -
Figure 6 depicts the call flows for a scenario where old P-CSCF 12 transfers call state information, e.g., QoS and CDRs, and S-CSCF 16 transfers the key information,e.g. SA keys 32, to new P-CSCF 14. As with the prior scenario, the command for context transfer comes from S-CSCF 16. The only difference here is the key transfer. The call flow, before handover, is as follows. The call flow, after handover, is the same as above. - Before Handover:
- o Old P-
CSCF 12 subscribes to mobility event package with S-CSCF 16 (via SUBSCRIBE/NOTIFY) and vice versa. - o P-
CSCF 12 also subscribes to mobility event package with Mobile Node 10 (via SUBSCRIBE). -
o Mobile Node 10 receives some early indications on subnet change. -
o Mobile Node 10 notifies the old P-CSCF 12 of anyimminent movement 18 with new P-CSCF 14 address and old P-CSCF 12 forwards the new address to S-CSCF 16 (via NOTIFY). - ∘ S-
CSCF 16 sends the new P-CSCF 14 address to old P-CSCF 12 (via NOTIFY). - ∘ S-
CSCF 16 sends theSA keys 32 to new P-CSCF 14 (via NOTIFY). - o New P-
CSCF 14 establishes theSA 26 forMobile Node 10 and the gate is open forMobile Node 10 at the new PDSN. - o Old P-
CSCF 12 transfers call state information to new P-CSCF 14. -
o Mobile Node 10 receives a definite indication regarding handover and connects to new access link.
- o Old P-
- Reactive handover employs handover preparation as and when access link change happens. There are several components that constitute or cause the delay during reactive handover, and in general this delay is much higher than proactive handover. Accordingly, techniques to perform and to minimize handover delay are presented.
- As defined earlier, network controlled means S-
CSCF 16 control handover. It is also assumed, in the alternatives described below, that network elements have the following capabilities: - Mobility event package is supported by the S-
CSCF 16 and P-CSCFs. - A CXTP is available between P-CSCFs.
- SA can exist between P-CSCFs and between S-
CSCF 16 and P-CSCF. -
Figure 7 depicts the call flows for a scenario where old P-CSCF 12 transfers call state information includingSA keys 32 of aMobile Node 10 to new P-CSCF 14 after receiving a command from S-CSCF 16. The call flow is as follows: - Before Handover:
-
o Mobile Node 10 receives an indication regarding handover and connects to new access link, and thus handover happens.
-
- After Handover:
-
o Mobile Node 10 sends MIP binding update as the interface address changes. -
o Mobile Node 10 sends SIP registration to old P-CSCF 12, and P-CSCF 12 forwards it to S-CSCF 16 (via REGISTER). - o S-
CSCF 16 sends a CTP, e.g. command for CXTP, including the new P-CSCF 14 address to old P-CSCF 12. - o Old P-
CSCF 12 transfers the context 30 (push model) to new P-CSCF 14 including theSA keys 32. - o Both
Mobile Node 10 and new P-CSCF 14 establishSAs 26 between them and gate is open for media. - o Media flow resumes.
-
o Mobile Node 10 and S-CSCF 16 also completes the registration process via normal AKA procedure. - o All incoming calls are forwarded to new P-
CSCF 14.
-
- The call flow shows that even with reactive handover, handoff delay can be reduced if the context transfer and corresponding security association can be established before the normal registration is complete. Both reactive handover steps and handoff delay are shaded in
Figure 7 . -
Figure 8 depicts the call flows for a scenario where new P-CSCF 14 fetches call state information includingSA keys 32 of aMobile Node 10 from old P-CSCF 12 after receiving a command from S-CSCF 16. The call flow before the handover is the same as for the above reactive push model; the call flow after the handover is as follows: - After Handover:
-
o Mobile Node 10 sends MIP binding update as the interface address changes. -
o Mobile Node 10 sends SIP registration to old P-CSCF 12 and old P-CSCF 12 forwards it to S-CSCF 16 (via REGISTER). - o S-
CSCF 16 sends a CTP command including the old P-CSCF 12 address to new P-CSCF 14. - o New P-
CSCF 14 fetches the context 30 (pull model) from the old P-CSCF 12 including theSA keys 32. - o Both
Mobile Node 10 and new P-CSCF 14 establishSAs 26 between them and gate is open for media. - o Media flow resumes.
-
o Mobile Node 10 and S-CSCF 16 also completes the registration process via normal AKA procedure. - o All incoming calls are forwarded to new P-
CSCF 14.
-
-
Figure 9 depicts the call flows for the scenario where old P-CSCF 12 transfers call state information, and S-CSCF 16 transfers thekey information 32 to new P-CSCF 14. In this case, the command for context transfer comes from S-CSCF 16. The only difference here is the key transfer. The call flow before handover is the same as the other reactive embodiments, and the call flow after handover is as follows: - After Handover:
-
o Mobile Node 10 sends MIP binding update as the interface address changes. -
∘ Mobile Node 10 sends SIP registration to old P-CSCF 12 and old P-CSCF 12 forwards it to S-CSCF 16 (via REGISTER). - o S-
CSCF 16 sends a CTP command including the new P-CSCF 14 address to old P-CSCF 12. - o S-
CSCF 16 sends theSA keys 32 to new P-CSCF 14. - o New P-
CSCF 14 establishes theSA 26 forMobile Node 10 and the gate is open forMobile Node 10 at the new PDSN. - o Old P-
CSCF 12 transfers the context (push model) 30, to the old P-CSCF 12. - o Media flow resumes.
-
∘ Mobile Node 10 and S-CSCF 16 also completes the registration process via normal AKA procedure. - o All incoming calls are forwarded to new P-
CSCF 14.
-
-
Figure 10 depicts the call flows for the scenario where new P-CSCF 14 fetches call state information from old P-CSCF 12 and S-CSCF 16 transfers thekey information 32 to new P-CSCF 14. The command for context transfer comes from S-CSCF 16 as in the other reactive embodiments. The only difference here is the key transfer. The call flow before handover is the same as the other reactive embodiments, and the call flow after handover is as follows: - After Handover:
-
o Mobile Node 10 sends MIP binding update as the interface address changes. -
o Mobile Node 10 sends SIP registration to old P-CSCF 12 and old P-CSCF 12 forwards it to S-CSCF 16 (via REGISTER). - o S-
CSCF 16 sends a CTP command including the old P-CSCF 12 address to new P-CSCF 14. - ∘ S-
CSCF 16 sends theSA keys 32 to new P-CSCF 14. - o New P-
CSCF 14 establishes theSA 26 forMobile Node 10 and the gate is open forMobile Node 10 at the new PDSN. - o New P-
CSCF 14 fetches the context 30 (pull model) from the old P-CSCF 12. - o Both
Mobile Node 10 and new P-CSCF 14 establishSAs 26 between them and gate is open for media. - o Media flow resumes.
-
∘ Mobile Node 10 and S-CSCF 16 also completes the registration process via normal AKA procedure. - o All incoming calls are forwarded to new P-
CSCF 14.
-
- A simple scenario to demonstrate bootstrapping of IPSec SAs during the course of SIP registration in the IMS/MMD network is presented. A second scenario will demonstrate IPSec state transfer followed by rapid establishment of IPSec SAs during P-CSCF handoff. The latter scenario will also demonstrate the use of a context transfer mechanism involving both P-CSCFs and S-
CSCF 16. Many of the optimization techniques can be realized using common SIP methods. - The security association in the target proxy can be set up ahead of time by performing proactive AKA. Using proactive AKA, the mobile can pre-register via the target P-CSCF even if the mobile is in the previous network. Using a network discovery mechanism, the mobile determines the first hop proxy (new P-CSCF 14) in the neighboring or visited
network 22 and registers with home S-CSCF 16, but uses new P-CSCF 14 as the current outbound proxy. Since AKA process is established by virtue of registration process, a new security association is established with new P-CSCF 14. Since new security association is established, it helps to open the gate at the PDSN in the new network. This will avoid the delay associated with the AKA procedure and opening the gate. - However there are other issues such as maintaining dual registrations of outbound P-
CSCFs CSCF 16. It is important that the S-CSCF 16 can maintain simultaneous registrations for a small amount of time with the addresses of both P-CSCF 12 of thecurrent network 24 and P-CSCF 14 of thenew network 22. This will enable two different security associations to coexist on the mobile at the same time. There is a separate security association with each P-CSCF. As soon as the mobile moves to thenew network 22, the old security association (security association between the mobile and P-CSCF in the previous network) is deleted, but the mobile still keeps the new security association that was established between mobile and new P-CSCF 14. -
Figure 11 shows a bootstrapping scenario in IMS/MMD architecture, and illustrates IPSec SA creation during initial registration. On boot up in the visitednetwork 22,Mobile Node 10 performs the SIP registration procedure with the S-CSCF 16 via visitednetwork 1's 22 P-CSCF 14. During the course of the SIP registration process,Mobile Node 10 also establishes anIPSec SA 26 with the P-CSCF 14. -
Figure 12 illustrates message flows associated with a scenario where the IPSec SAs have not been established successfully. As a consequence, SIP registration will fail, which will be shown as registration failure. - Two alternative steps are presented to illustrate the above scenarios. In the first alternative, SA keys are preconfigured at the P-CSCF and
Mobile Node 10, and these SA keys trigger the creation of IPSec SAs via the SIP Registration process. SA creation failure could be demonstrated by intentionally misconfiguring keys at the P-CSCF. In the second alternative, the keys are transferred from the S-CSCF 16 to the P-CSCF as part of the SIP Registration procedure. -
Figure 13 shows the optimized handoff scenario for IPSec SAs. In this case, the UE will move from visitednetwork 1 22 to visitednetwork 2 34. The UE's context information, e.g.IPSec SA keys 32, will be transferred from the old P-CSCF 12, e.g. visitednetwork 1 22, to the new P-CSCF 14, e.g. visitednetwork 2 34, well in advance so that the establishment ofSAs 26 at the new P-CSCF 14 can happen beforeMobile Node 10 physically moves to visitednetwork 2 34. This will be achieved by obtaining a movement indication message from the UE beforeMobile Node 10 moves tonetwork 2 34. In addition, the UE orMobile Node 10 will also establishSAs 26 with the new P-CSCF 14 prior to moving tonetwork 2 34. The message flows associated with this scenario are shown inFigure 14 . - In one embodiment of the optimized handoff scenarios described above, the
keys 32 are transferred from the old P-CSCF 12 to the new P-CSCF 14 using a simple CXTP implementation over TCP/UDP. - In another embodiment, the
keys 32 are transferred from S-CSCF 16 to P-CSCF 14. Sending a notification from the old P-CSCF 12 to the S-CSCF 16 indicating UE's intention to move would cause S-CSCF 16 to pro-actively transfer thekeys 32 to the new P-CSCF 14. - In one embodiment, movement indication will be provided by the UE and the address of the new P-
CSCF 14 will be hard coded at the UE, and transferred to the old P-CSCF 12 as part of the move notification. Any mechanism to predict the next P-CSCF 14 can be used. - Implementation details of an embodiment of the security optimization that has been carried out in the IMS/MMS architecture are presented, including the complete architecture of the software agents associated with
Mobile Node 10, P-CSCF CSCF 16. These agent architectures illustrate the basic functionalities of the software modules installed in each of these functional components. The proof-of-concept of some of the security optimization techniques using software agents that use XML over TCP has been completed. In reality, S-CSCF 16 and P-CSCF context transfer 30 between P-CSCFs CSCF 16 and P-CSCF 12. -
Figure 15 shows implementation steps for three different scenarios: a) bootstrapping, b) context generation, and c) mobility, illustrating the interaction between different functional modules or entities, such asMobile Node 10, P-CSCFs CSCF 16. Each of these entities has agents that interact with each other to provide the desired functionality. The details of these agents, and different messages these agents can send and receive, are described below. - The behavior of the mobile and function of the agent on the mobile is described. In the proof-of-concept implementation, the mobile agent is pre-provisioned with a sequence of keys that may be used for setting up SAs with various P-CSCFs. In practice, a single key would be pre-provisioned at the mobile, and SA keys would be generated by applying appropriate functions on this single key in conjunction with random numbers from the P-CSCF (as part of AKA).
- On startup,
Mobile Node 10 snoops for an outgoing registration message. When this message is detected,Mobile Node 10 sets up an SA with the current P-CSCF 12 using the first key in its pre-provisioned list. When movement to a different P-CSCF 14 becomes imminent,Mobile Node 10 sends an XML encoded MoveNotify message to its current P-CSCF 12. The only parameter carried by this message is the IP address of next P-CSCF 14 to which thisMobile Node 10 expects to move. The mechanism by whichMobile Node 10 is able to infer the identity of the next P-CSCF 14 is out of the scope of this implementation. After sending the MoveNotify message,Mobile Node 10 uses the next key in its list to establish anSA 26 with the next P-CSCF 14. - The agent architecture for P-CSCF, and how the P-CSCF handles different messages, is as follows. The P-CSCF agent runs in two Java threads. A "snooper" thread snoops for REGISTRATION and INVITE message from
Mobile Node 10. On detection of a Registration message fromMobile Node 10, it sends a GetKey message to the S-CSCF 16 with a single parameter:Mobile Node 10's IP. The GetKey message is a request to obtain the current key from the S-CSCF 16 defined for this specific mobile. On detection of an INVITE message, the P-CSCF agent generates a local context record forMobile Node 10 as shown inFigures 15a ), b), and c). - The P-CSCF agent also runs a thread that listens for several messages. On receiving a MoveNotify from
Mobile Node 10, the agent sends a corresponding MoveNotify to the S-CSCF 16 with the addresses of thenext PCSCF 14 andMobile Node 10 as parameters. This message also triggers thecontext transfer procedures 30 at the S-CSCF 16. This agent also listens for the KeyMsg message from the S-CSCF 16 that contains the keying information for a specific mobile node and establishes anSA 26 with Mobile Node upon receipt. The agent also listens for a Context Transfer message from a previous P-CSCF 12 containing the IP address ofMobile Node 10 whose context is being transferred along with the actual context information being transferred. The agent sets up the local context forMobile Node 10 using the received context information. The agent also listens for a Do Context Transfer message from the S-CSCF 16 carrying the address ofMobile Node 10 whose context needs to be transferred, and the address of the P-CSCF 14 to which the context needs to be transferred. The agent executes theactual context transfer 30 to new P-CSCF 14 by using the Context Transfer message described above. - S-
CSCF 16 agent listens for GetKey and MoveNotify messages from P-CSCFs in visited networks. The GetKey message contains the IP address of aMobile Node 10 as a parameter and triggers a key lookup for thatMobile Node 10. Once the lookup is completed, the agent sends a KeyMsg to the requesting P-CSCF with the keying data and Mobile Node's IP address as parameters. The MoveNotify message contains the address ofMobile Node 10 intending to change P-CSCFs as well as the address of the next P-CSCF 14 to whichMobile Node 10 plans to move. The agent then looks up current key forMobile Node 10 and sends a KeyMsg to the next P-CSCF 14 containing the keying information and the IP address ofMobile Node 10 as parameters. The agent then sends a Do Context Transfer message to Mobile Node's current P-CSCF 12, with the IP addresses ofMobile Node 10 and the next P-CSCF 14 to whichMobile Node 10 plans to move. - All the messages discussed in this section are transmitted as XML encoded text over TCP in the proof-of-concept implementation. These messages can be embedded into SIP payloads for the purpose of integrating the agent functionality into the actual P-
CSCF CSCF 16 and Mobile User Agent entities. However, other message techniques known in the art can be used. -
Figure 16 shows another proactive handoff scenario that has been implemented in the current IMS/MMD architecture. This actually emulates the some of the functions that are performed by AKA. This way, the packet loss due to handoff is limited to MIP delay andlayer 2 handoff delay only. - While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the below claims.
Claims (20)
- A method for handoff in a Multimedia Domain, IMS/MMD, architecture of a mobile node (10) in a first visited network (24), said mobile node being associated with a first Session Initiation Protocol, SIP, component (12) in said first visited network, said first SIP component being associated with a second SIP component (16) in a second visited network (22) such that said first and second SIP components interact with each other, said mobile node moving from said first visited network (24) to the second visited network (22), said method comprising:preparing to move said mobile node to said second visited network by transferring context information (30) from said first SIP component to a third SIP component (14) in said second visited network while said mobile node is still in said first visited network; andestablishing a security association between said mobile node and said third SIP component using said context information while said mobile node is still in said first visited network,wherein all security state information is transferred from said first SIP component to said third SIP component before any media packet from said mobile node passes through said second visited network.
- The method according to claim 1, wherein said transferring step includes transferring context information (30) through said second SIP component (16).
- The method according to claim 2, wherein said context information is call state information excluding keys (32) and said second SIP component includes said keys, said transferring step including transferring said keys from said second SIP component to said third SIP component.
- The method according to claim 1, wherein said context information is transferred directly from said first SIP component to said third SIP component.
- The method according to claim 4, wherein said context information is call state information including keys.
- The method according to claim 1, wherein said preparing step is a pre-authentication procedure.
- The method according to claim 1, wherein said third SIP component has an address and said preparing step includes sending said address of said third SIP component to said first and second SIP components.
- The method according to claim 1, wherein said first SIP component is one of a signalling entity and an IP component, said second SIP component is a signalling entity, and said third SIP component is one of a signalling entity and an IP component.
- The method of claim 1, wherein
establishing said security association between said mobile node and said third SIP component using said context information is made before said mobile node registers in said second network. - The method according to claim 9, wherein said transferring step occurs in response to a fetch from the third SIP component.
- A system for handoff in a Multimedia Domain, IMS/MMD, architecture, comprising:a mobile node (10) in a first visited network (24);a first Session Initiation Protocol, SIP, component (12) in said first visited network, said first SIP component being associated with said mobile node, said first SIP component having context information (30);a second SIP component (16) in a second visited network (22), said second SIP component being associated with said first SIP component such that said first and second SIP components interact with each other; andthe second visited network (22) having a third SIP component (14) having an address, wherein while said mobile node is in said first visited network, a security association is created between said mobile node and said third SIP component in said second visited network, and said context information is transferred from said first SIP component to said third SIP component andwherein security state information is transferred from said first SIP component to said third SIP component before any media packet from said mobile node passes through said second visited network.
- The system according to claim 11, wherein said context information is transferred through said second SIP component.
- The system according to claim 12, wherein said context information is call state information excluding keys (32) and said second component includes said keys, and said keys are transferred from said second SIP component to said third SIP component.
- The system according to claim 11, wherein said context information is transferred directly from said first SIP component to said third SIP component.
- The system according to claim 14, wherein said context information is call state information including keys.
- The system according to claim 11, wherein context information is transferred in response to a fetch from the third SIP component.
- The system according to claim 11, further comprising a pre-authentication procedure for preparing the mobile to move.
- The system according to claim 11, wherein when the mobile node prepares to move said address of said third SIP component is sent to said first and second SIP components.
- The system according to claim 11, wherein said first SIP component is one of a signalling entity and an IP component, said second SIP component is a signalling entity, and said third SIP component is one of a signalling entity and an IP component.
- The system of claim 11, wherein before said mobile node is registered in said second network, said context information is transferred from said first SIP component to said third SIP component and a security association is created between said mobile node and said third SIP component.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US84367606P | 2006-09-11 | 2006-09-11 | |
PCT/US2007/019784 WO2008033381A2 (en) | 2006-09-11 | 2007-09-11 | P-cscf fast handoff for ims/mms architecture |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2067364A2 EP2067364A2 (en) | 2009-06-10 |
EP2067364A4 EP2067364A4 (en) | 2012-07-11 |
EP2067364B1 true EP2067364B1 (en) | 2014-12-10 |
Family
ID=39184310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07838064.9A Ceased EP2067364B1 (en) | 2006-09-11 | 2007-09-11 | P-cscf fast handoff for ims/mms architecture |
Country Status (5)
Country | Link |
---|---|
US (2) | US8098627B2 (en) |
EP (1) | EP2067364B1 (en) |
JP (1) | JP4864797B2 (en) |
CA (1) | CA2663143C (en) |
WO (1) | WO2008033381A2 (en) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080095114A1 (en) | 2006-10-21 | 2008-04-24 | Toshiba America Research, Inc. | Key Caching, QoS and Multicast Extensions to Media-Independent Pre-Authentication |
KR100946900B1 (en) * | 2007-01-11 | 2010-03-09 | 삼성전자주식회사 | Method And System for IMS re-registration request |
KR101055109B1 (en) | 2007-07-25 | 2011-08-08 | 엘지전자 주식회사 | How to Move Sessions and How to Support Session Continuity |
JP4909864B2 (en) * | 2007-10-04 | 2012-04-04 | Kddi株式会社 | Handoff method, radio base station apparatus and gateway apparatus in mobile communication system |
EP2091203A1 (en) * | 2008-02-12 | 2009-08-19 | Koninklijke KPN N.V. | Method and system for transmitting a multimedia stream |
US8948125B2 (en) * | 2008-01-10 | 2015-02-03 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for handover and domain transfer in a telecommunications system |
WO2009109349A1 (en) * | 2008-03-03 | 2009-09-11 | Panasonic Corporation | Information exchange between gateways for route optimization with network-based mobility management |
JPWO2010052918A1 (en) | 2008-11-07 | 2012-04-05 | パナソニック株式会社 | HANDOVER CONTROL SYSTEM, USER TERMINAL, SIGNALING RELAY DEVICE, AND SESSION CONTROL DEVICE |
US8505076B2 (en) * | 2009-05-03 | 2013-08-06 | Kabushiki Kaisha Toshiba | Proactive authentication |
US8194615B2 (en) * | 2009-05-21 | 2012-06-05 | Motorola Mobility, Inc. | Method for conserving resources during wireless handover of a dual mode mobile station |
US8774411B2 (en) * | 2009-05-29 | 2014-07-08 | Alcatel Lucent | Session key generation and distribution with multiple security associations per protocol instance |
CN101932057B (en) * | 2009-06-22 | 2013-08-28 | 华为技术有限公司 | Method, communication device and communication system of switching processing |
CN103458450B (en) * | 2009-06-22 | 2018-01-09 | 华为技术有限公司 | Switching handling method, the communicator of hand-off process and communication system |
JP2013505612A (en) * | 2009-09-21 | 2013-02-14 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | Caching in mobile networks |
FR2953351B1 (en) * | 2009-12-01 | 2015-05-15 | Thales Sa | METHOD FOR PROVIDING CONTINUITY FOR MANAGING COMMUNICATION SESSIONS OPERATED FROM A FOURTH GENERATION MOBILE TERMINAL |
GB2513057B (en) * | 2010-05-07 | 2014-11-26 | Samsung Electronics Co Ltd | Improvements to handover |
KR101217896B1 (en) * | 2010-09-09 | 2013-01-02 | 중앙대학교 산학협력단 | Mobile terminal and Handover method of the mobile terminal |
JP5601421B2 (en) | 2011-07-22 | 2014-10-08 | 富士通株式会社 | Server apparatus, communication control program, and communication control method |
US9374744B2 (en) * | 2011-08-10 | 2016-06-21 | Kt Corporation | Apparatus and method for seamless handoff of a service between different types of networks |
CN107276811B (en) * | 2013-08-07 | 2021-02-09 | 华为技术有限公司 | Method, related device and system for realizing terminal called service recovery |
US9585013B2 (en) | 2014-10-29 | 2017-02-28 | Alcatel Lucent | Generation of multiple shared keys by user equipment and base station using key expansion multiplier |
US9729588B2 (en) * | 2014-10-31 | 2017-08-08 | T-Mobile Usa, Inc. | SPI handling between UE and P-CSCF in an IMS network |
KR102240727B1 (en) | 2015-01-28 | 2021-04-15 | 삼성전자주식회사 | Apparatus and method for establishing security association in communication system |
US10523720B2 (en) * | 2015-02-27 | 2019-12-31 | Telefonaktiebolaget Lm Ericsson (Publ) | P-CSCF recovery and reregistration |
CN108632936B (en) * | 2017-03-21 | 2022-11-22 | 中兴通讯股份有限公司 | Method for anchoring core network, UE and PGW |
PT3756373T (en) * | 2018-02-19 | 2021-08-30 | Ericsson Telefon Ab L M | Supporting interworking and/or mobility between different wireless communication systems |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7925762B1 (en) * | 2000-08-10 | 2011-04-12 | Nokia Corporation | Roaming support method and systems in UMTS |
WO2003092218A1 (en) * | 2002-04-26 | 2003-11-06 | Thomson Licensing S.A. | Transitive authentication authorization accounting in interworking between access networks |
JP2004056255A (en) * | 2002-07-17 | 2004-02-19 | Mitsubishi Electric Corp | Band control method in mobile network |
US6910106B2 (en) * | 2002-10-04 | 2005-06-21 | Microsoft Corporation | Methods and mechanisms for proactive memory management |
US6788676B2 (en) * | 2002-10-30 | 2004-09-07 | Nokia Corporation | User equipment device enabled for SIP signalling to provide multimedia services with QoS |
US7350077B2 (en) * | 2002-11-26 | 2008-03-25 | Cisco Technology, Inc. | 802.11 using a compressed reassociation exchange to facilitate fast handoff |
GB0312681D0 (en) * | 2003-06-03 | 2003-07-09 | Ericsson Telefon Ab L M | IP mobility |
JP4265945B2 (en) * | 2003-08-08 | 2009-05-20 | 三菱電機株式会社 | Signaling transfer method in mobile network and mobile network |
US7359373B2 (en) | 2003-10-17 | 2008-04-15 | Nokia Corporation | System, apparatus, and method for establishing circuit-switched communications via packet-switched network signaling |
EP1706963A4 (en) * | 2003-11-02 | 2011-06-15 | Yossy Sela | Mobile telephone gateway apparatus, communication system, and gateway operating system |
EP1531645A1 (en) * | 2003-11-12 | 2005-05-18 | Matsushita Electric Industrial Co., Ltd. | Context transfer in a communication network comprising plural heterogeneous access networks |
US7046647B2 (en) * | 2004-01-22 | 2006-05-16 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US8042170B2 (en) * | 2004-07-15 | 2011-10-18 | Qualcomm Incorporated | Bearer control of encrypted data flows in packet data communications |
US20060018280A1 (en) * | 2004-07-20 | 2006-01-26 | Nokia Corporation | System and associated mobile node, foreign agent and method for link-layer assisted mobile IP fast handoff from a fast-access network to a slow-access network |
CN1761359B (en) * | 2004-10-12 | 2012-02-29 | 株式会社日立制作所 | Mobile communication control method and communication control system |
JP4703657B2 (en) * | 2004-11-05 | 2011-06-15 | 株式会社東芝 | Network search method |
KR100762615B1 (en) * | 2004-11-26 | 2007-10-01 | 삼성전자주식회사 | Mobile Telecommunication System and Handoff Method for the Same |
US7551585B2 (en) * | 2004-12-03 | 2009-06-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Seamless handoff for multimedia services |
JP4617911B2 (en) * | 2005-02-09 | 2011-01-26 | 株式会社日立製作所 | COMMUNICATION DEVICE, COMMUNICATION CONTROL DEVICE, AND COMMUNICATION SYSTEM |
US20060252438A1 (en) * | 2005-05-04 | 2006-11-09 | Ansamaa Jarkko H | Determining user equipment time zones for time-based service fulfillment |
US10178522B2 (en) * | 2005-08-02 | 2019-01-08 | Qualcomm Incorporated | VoIP emergency call support |
US20080095070A1 (en) * | 2005-12-05 | 2008-04-24 | Chan Tat K | Accessing an IP multimedia subsystem via a wireless local area network |
US7969945B2 (en) * | 2006-01-11 | 2011-06-28 | Starent Networks Llc | Systems and methods for mobility management on wireless networks |
CN101422064B (en) * | 2006-02-09 | 2012-01-04 | 思达伦特网络有限责任公司 | Fast handoff support for wireless networks |
US20070189218A1 (en) * | 2006-02-11 | 2007-08-16 | Yoshihiro Oba | Mpa with mobile ip foreign agent care-of address mode |
CN101496387B (en) * | 2006-03-06 | 2012-09-05 | 思科技术公司 | System and method for access authentication in a mobile wireless network |
FI20060240A0 (en) * | 2006-03-13 | 2006-03-13 | Nokia Corp | Procedure for transmitting information during a handover in a communication system |
US7706779B2 (en) * | 2006-03-16 | 2010-04-27 | Research In Motion Limited | System and method for controlling VCC functionality in a network environment including IMS |
JP4965646B2 (en) * | 2006-04-17 | 2012-07-04 | シスコ テクノロジー インコーポレーテッド | System and method for traffic localization |
US8311021B2 (en) * | 2006-06-21 | 2012-11-13 | Nokia Corporation | Method, system and computer program product for providing session initiation/delivery through a WLAN to a terminal |
US8391873B2 (en) * | 2006-07-21 | 2013-03-05 | Qualcomm Incorporated | Systems and methods for coordinating supplementary services for voice telephone calls in a centralized fashion |
US20080049648A1 (en) * | 2006-08-28 | 2008-02-28 | Motorola, Inc. | Method and apparatus for policy management for an internet protocol multimedia subsystem based wireless communication system |
US8045522B2 (en) * | 2006-10-27 | 2011-10-25 | Futurewei Technologies, Inc. | Method and system for performing handoff in wireless networks |
US8929360B2 (en) * | 2006-12-07 | 2015-01-06 | Cisco Technology, Inc. | Systems, methods, media, and means for hiding network topology |
US8612752B2 (en) * | 2008-10-30 | 2013-12-17 | Symbol Technologies, Inc. | Communicating a packet from a mesh-enabled access point to a mesh portal in a multi-hop mesh network |
-
2007
- 2007-03-30 JP JP2007095474A patent/JP4864797B2/en not_active Expired - Fee Related
- 2007-09-11 WO PCT/US2007/019784 patent/WO2008033381A2/en active Search and Examination
- 2007-09-11 EP EP07838064.9A patent/EP2067364B1/en not_active Ceased
- 2007-09-11 US US11/900,450 patent/US8098627B2/en active Active
- 2007-09-11 CA CA2663143A patent/CA2663143C/en not_active Expired - Fee Related
-
2011
- 2011-12-12 US US13/323,317 patent/US8971291B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2067364A4 (en) | 2012-07-11 |
US20120082136A1 (en) | 2012-04-05 |
US20080069050A1 (en) | 2008-03-20 |
WO2008033381A3 (en) | 2008-05-29 |
JP4864797B2 (en) | 2012-02-01 |
US8971291B2 (en) | 2015-03-03 |
CA2663143C (en) | 2015-12-08 |
EP2067364A2 (en) | 2009-06-10 |
WO2008033381A2 (en) | 2008-03-20 |
CA2663143A1 (en) | 2008-03-20 |
US8098627B2 (en) | 2012-01-17 |
JP2008072687A (en) | 2008-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2067364B1 (en) | P-cscf fast handoff for ims/mms architecture | |
US10687373B2 (en) | Optimizations for voice handovers over wireless data access | |
EP2638753B1 (en) | Packet switched to circuit switched access handovers in an ims architecture | |
EP1992181B1 (en) | System and method for handover of an access terminal in a communication network | |
EP2111585B1 (en) | Flexible mobility framework for heterogeneous roaming in next generation wireless networks | |
US20050286504A1 (en) | Mobile terminal, session initiation protocol server, and method of controlling routing path for voice-over-internet protocol service, based on mobile internet protocol, voice-over-internet protocol, and session initiation protocol | |
US9025553B2 (en) | Capability update in a telecommunications network | |
KR20120024823A (en) | Methods and apparatus for session transfer between access networks | |
EP2160862A2 (en) | Mih pre-authentication | |
KR20100010936A (en) | Method, system and device for location update in networks | |
TW200803280A (en) | Method and apparatus for mobility management in communication networks | |
Vidal et al. | Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism | |
US20090163203A1 (en) | Method and Wireless System for Achieving Local Anchoring of a Mobile Node | |
Larsen et al. | Optimized macro mobility within the 3GPP IP multimedia subsystem | |
US10863342B2 (en) | Method and device for processing a signaling message related to a communication service of a client device | |
EP2286617B1 (en) | Method and apparatus for communication between wireless telecommunications networks of different technology types | |
Romijn et al. | Mobility management for SIP sessions in a heterogeneous network environment | |
Chiba et al. | Trombone Routing Mitigation Techniques for IMS/MMD Networks | |
CN101959173A (en) | Data transmission method, communication system and related equipment | |
Munasinghe et al. | Interworking between WLAN and 3G cellular networks: an IMS based architecture | |
Corici et al. | Multimedia mobility service solution | |
Boutabia et al. | Towards service continuity in IMS heterogeneous access networks | |
Chiang et al. | Network-Initiated Triggering for Mobility in Voice over 3GPP-WLAN | |
Khan et al. | Seamless mobility management between IP-based networks | |
Larsen | Mobility schemes for future networks based on the IMS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090331 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 4/00 20090101AFI20090511BHEP |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: CHEE, DANA Inventor name: DAS, SUBIR Inventor name: LI, SHIH-WEI Inventor name: CHIBA, TSUNEHIKO Inventor name: LIN, JOE Inventor name: DUTTA, ASHUTOSH Inventor name: GHOSH, ABHRAJIT Inventor name: MANOUSAKIS, KYRIAKOS Inventor name: IDOUE, AKIRA Inventor name: YOKOTA, HIDETOSHI |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: DAS, SUBIR Inventor name: CHEE, DANA Inventor name: YOKOTA, HIDETOSHI Inventor name: LI, SHIH-WEI Inventor name: CHIBA, TSUNEHIKO Inventor name: IDOUE, AKIRA Inventor name: DUTTA, ASHUTOSH Inventor name: GHOSH, ABHRAJIT Inventor name: LIN, JOE Inventor name: MANOUSAKIS, KYRIAKOS |
|
DAX | Request for extension of the european patent (deleted) | ||
RBV | Designated contracting states (corrected) |
Designated state(s): DE GB |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602007039652 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04W0004000000 Ipc: H04W0036000000 |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20120613 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 36/00 20090101AFI20120607BHEP Ipc: H04L 29/06 20060101ALI20120607BHEP |
|
17Q | First examination report despatched |
Effective date: 20130214 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20140708 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: DAS, SUBIR Inventor name: DUTTA, ASHUTOSH Inventor name: MANOUSAKIS, KYRIAKOS Inventor name: YOKOTA, HIDETOSHI Inventor name: CHEE, DANA Inventor name: GHOSH, ABHRAJIT Inventor name: LI, SHIH-WEI Inventor name: LIN, JOE Inventor name: CHIBA, TSUNEHIKO Inventor name: IDOUE, AKIRA |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: KDDI CORPORATION Owner name: TELCORDIA TECHNOLOGIES, INC. |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602007039652 Country of ref document: DE Effective date: 20150122 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602007039652 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20150911 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20200929 Year of fee payment: 14 Ref country code: GB Payment date: 20200928 Year of fee payment: 14 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602007039652 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20210911 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210911 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220401 |